Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    90s
  • max time network
    137s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15/09/2024, 02:30

General

  • Target

    e18770d9dae93b154f05e08ff1eeaa21_JaffaCakes118.exe

  • Size

    1.2MB

  • MD5

    e18770d9dae93b154f05e08ff1eeaa21

  • SHA1

    5f0f57a7a50e5875185fa061c9705c1b50bc6d34

  • SHA256

    bc21da0b43069297b3787f060c7c27301af1c9ce65d182eb963a431a41f9c395

  • SHA512

    39d4a79c0efe41fcbbcd8d480d3e3e770f821adf73f412401a0b1bfad1d06ddf174a56882fcd566cbfb18d08071bdf7e129bc9ea5bc5da1b9c0344b50c702cc1

  • SSDEEP

    12288:qIkvBbE9oqrfexkY+43TaPmvMZBmAMETIpmvl8u3fV+1hgxYSjfHDmwyOhrxmhwO:HQADYngNK450Ti4h94vKHQXc

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e18770d9dae93b154f05e08ff1eeaa21_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\e18770d9dae93b154f05e08ff1eeaa21_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1848
    • C:\Windows\SysWOW64\drvhost.exe
      "C:\Windows\system32\drvhost.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:324
      • C:\ProgramData\syshost.exe
        C:\ProgramData\syshost.exe
        3⤵
        • Executes dropped EXE
        PID:4348
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4348 -s 12
          4⤵
          • Program crash
          PID:4792
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4348 -ip 4348
    1⤵
      PID:3032

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\ProgramData\syshost.exe

      Filesize

      6KB

      MD5

      36c689700adbb227867e409938607270

      SHA1

      6123e236f73faa37600a60107a5b167980b83a61

      SHA256

      a2158014ecd471868954d0e97397f9df43e310c48d56fa0b5a6ef908dc654adf

      SHA512

      c75728ed30135032a6755e33b9034b98c871554c33a4b8ba1586e0b3282dbc65e3b61571d407365b24289dae2de56b514ef0db744f85e6648dc6432a33b85fef

    • C:\Windows\SysWOW64\drvhost.exe

      Filesize

      1.2MB

      MD5

      e18770d9dae93b154f05e08ff1eeaa21

      SHA1

      5f0f57a7a50e5875185fa061c9705c1b50bc6d34

      SHA256

      bc21da0b43069297b3787f060c7c27301af1c9ce65d182eb963a431a41f9c395

      SHA512

      39d4a79c0efe41fcbbcd8d480d3e3e770f821adf73f412401a0b1bfad1d06ddf174a56882fcd566cbfb18d08071bdf7e129bc9ea5bc5da1b9c0344b50c702cc1

    • memory/324-20-0x0000000074910000-0x0000000074EC1000-memory.dmp

      Filesize

      5.7MB

    • memory/324-25-0x0000000074910000-0x0000000074EC1000-memory.dmp

      Filesize

      5.7MB

    • memory/324-24-0x0000000074910000-0x0000000074EC1000-memory.dmp

      Filesize

      5.7MB

    • memory/324-26-0x0000000074910000-0x0000000074EC1000-memory.dmp

      Filesize

      5.7MB

    • memory/1848-0-0x0000000074912000-0x0000000074913000-memory.dmp

      Filesize

      4KB

    • memory/1848-1-0x0000000074910000-0x0000000074EC1000-memory.dmp

      Filesize

      5.7MB

    • memory/1848-2-0x0000000074910000-0x0000000074EC1000-memory.dmp

      Filesize

      5.7MB

    • memory/1848-17-0x0000000074910000-0x0000000074EC1000-memory.dmp

      Filesize

      5.7MB